2024-12-08 03:06:42 +00:00

138 lines
3.8 KiB
JSON

{
"id": "CVE-2006-0439",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-01-26T22:03:00.000",
"lastModified": "2024-11-21T00:06:28.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Text Rider 2.4 stores sensitive data in the data directory under the web document root with insufficient access control, which allows remote attackers to obtain usernames and password hashes by directly accessing data/userlist.txt."
},
{
"lang": "es",
"value": "Text Rider 2.4 almacena informaci\u00f3n sensible en el directorio de datos bajo la ra\u00edz de documentos web, lo que permite a atacantes remotos obtener nombres de usuario y huellas (hashes) de contrase\u00f1as accediendo directamente a data/userlist.txt."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:text_rider:text_rider:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D582D746-E98A-4AFA-9823-AB98D5F47F70"
}
]
}
]
}
],
"references": [
{
"url": "http://evuln.com/vulns/46/summary.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/18605",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1015533",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/423130/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/0321",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24279",
"source": "cve@mitre.org"
},
{
"url": "http://evuln.com/vulns/46/summary.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/18605",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1015533",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/423130/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2006/0321",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24279",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}